Tagged articles
29 articles
Page 1 of 1
Black & White Path
Black & White Path
May 16, 2026 · Information Security

Node‑ipc Hit Again: Inside the Second Wave of npm Supply‑Chain Attacks

On May 14, 2026, security teams uncovered three malicious node‑ipc npm releases that used a Lily‑Pad account‑hijack technique to inject an 80 KB obfuscated payload, exfiltrate credentials via DNS TXT tunneling, and prompt immediate version audits and credential rotation.

Lily Pad attackcredential theftinformation security
0 likes · 5 min read
Node‑ipc Hit Again: Inside the Second Wave of npm Supply‑Chain Attacks
Black & White Path
Black & White Path
May 11, 2026 · Information Security

How OceanLotus weaponized PyPI to deliver ZiChatBot malware using Zulip as C2

OceanLotus (APT32) hijacked three innocuous PyPI packages—uuid32-utils, colorinal, and termncolor—to drop the ZiChatBot malware, which persists via registry or crontab and communicates through the Zulip public chat REST API, making its traffic indistinguishable from legitimate developer traffic and evading network‑based detection.

Dependency PoisoningOceanLotusPyPI
0 likes · 11 min read
How OceanLotus weaponized PyPI to deliver ZiChatBot malware using Zulip as C2
Black & White Path
Black & White Path
May 9, 2026 · Information Security

Kaspersky Exposes DAEMON Tools Supply Chain Attack Infecting Over 100,000 Users

In May 2026, Kaspersky revealed that the official Windows installer for DAEMON Tools Lite versions 12.5.0.2421‑12.5.0.2434 had been compromised for nearly a month, allowing attackers to inject signed back‑door binaries, establish C2 communication, deliver staged payloads—including a QUIC RAT—to thousands of victims across more than a hundred countries, with high‑value targets primarily in Russia, Belarus and Thailand, before a patched version 12.6.0.2445 was released.

C2DAEMON ToolsKaspersky
0 likes · 7 min read
Kaspersky Exposes DAEMON Tools Supply Chain Attack Infecting Over 100,000 Users
Black & White Path
Black & White Path
Apr 29, 2026 · Information Security

Supply Chain Attack on SumatraPDF Targeting Chinese Users

A sophisticated supply‑chain intrusion discovered by Zscaler ThreatLabz weaponizes a tampered SumatraPDF binary, uses a custom AdaptixC2 beacon hidden in GitHub, and leverages Visual Studio Code tunnels to gain persistent remote access on Chinese‑language systems.

AdaptixC2SumatraPDFTropic Trooper
0 likes · 9 min read
Supply Chain Attack on SumatraPDF Targeting Chinese Users
Alibaba Cloud Native
Alibaba Cloud Native
Apr 3, 2026 · Information Security

How a Supply‑Chain Poisoning of LiteLLM Exposed Critical AI API Secrets – and What to Do

A March 2026 supply‑chain attack injected malicious code into LiteLLM versions 1.82.7/1.82.8, silently stealing API keys, SSH credentials, cloud tokens and more, while a cloud‑native AI gateway from Alibaba offers a secure, zero‑exposure alternative and detailed remediation steps.

AI securityAPI Key LeakageAlibaba Cloud AI Gateway
0 likes · 14 min read
How a Supply‑Chain Poisoning of LiteLLM Exposed Critical AI API Secrets – and What to Do
Black & White Path
Black & White Path
Mar 29, 2026 · Information Security

How Hackers Leveraged AI to Compromise Trivy and LiteLLM – A Supply‑Chain Attack Case Study

An obscure hacker group, TeamPCP, used an AI agent powered by Anthropic’s Claude to trick the open‑source security scanner Trivy into revealing its GitHub credentials, then injected malicious code into Trivy’s updates and subsequently compromised the AI gateway LiteLLM, exposing critical supply‑chain vulnerabilities in popular AI development tools.

AI securityClaudeLiteLLM
0 likes · 5 min read
How Hackers Leveraged AI to Compromise Trivy and LiteLLM – A Supply‑Chain Attack Case Study
Black & White Path
Black & White Path
Mar 27, 2026 · Information Security

Apifox CDN Supply Chain Attack: A Detailed Technical Walkthrough

On March 25, 2026 a malicious script hijacked Apifox's CDN, inflating a 34 KB tracking file to 77 KB and using obfuscated JavaScript, RSA and AES‑256‑GCM encryption to collect system fingerprints, SSH keys, Git credentials and exfiltrate them through a multi‑stage C2 chain.

ApifoxCDNElectron
0 likes · 15 min read
Apifox CDN Supply Chain Attack: A Detailed Technical Walkthrough
Shi's AI Notebook
Shi's AI Notebook
Mar 25, 2026 · Information Security

LiteLLM Compromised in 46 Minutes: Inside the 47,000‑Download Supply‑Chain Attack

In March 2026, attackers hijacked the official PyPI maintainer account of LiteLLM, released two malicious versions that were downloaded 46,996 times in 46 minutes, exfiltrated credentials, launched a fork‑bomb, and demonstrated how unpinned dependencies and .pth files can turn a simple package install into a full‑scale supply‑chain breach.

KubernetesLiteLLMPyPI
0 likes · 12 min read
LiteLLM Compromised in 46 Minutes: Inside the 47,000‑Download Supply‑Chain Attack
21CTO
21CTO
Mar 25, 2026 · Information Security

How a Supply‑Chain Attack Compromised LiteLLM and Stole Every Credential

A supply‑chain breach of the popular LiteLLM Python library injected malicious .pth files that silently harvest SSH keys, cloud credentials, and other secrets, deploy persistent backdoors, and spread through downstream packages, prompting urgent detection and remediation steps for developers.

DevOps SecurityLiteLLMPython
0 likes · 8 min read
How a Supply‑Chain Attack Compromised LiteLLM and Stole Every Credential
NiuNiu MaTe
NiuNiu MaTe
Mar 16, 2026 · Information Security

Is OpenClaw Safe? Inside the Massive AI Agent Security Crisis

OpenClaw, the popular AI agent with over 300,000 GitHub stars, harbors severe security flaws—including 512 vulnerabilities, malicious skill injections, and an exposed backend—allowing attackers to execute commands, steal credentials, and hijack systems; this article outlines the four main threat vectors and practical steps to mitigate them.

AI securityOpenClawprivilege escalation
0 likes · 9 min read
Is OpenClaw Safe? Inside the Massive AI Agent Security Crisis
Black & White Path
Black & White Path
Mar 10, 2026 · Information Security

Inside OpenClaw Skill Market: Popularity, Threats, and Defense Strategies

The article analyzes OpenClaw’s rapidly growing Skill ecosystem, exposing over 600 malicious plugins hidden among 13,000+ skills, details four poisoning techniques, presents a multi‑source detection pipeline with AI‑driven semantic audit, and offers practical defenses for both enterprises and ordinary users.

AI securityAgentArmorOpenClaw
0 likes · 18 min read
Inside OpenClaw Skill Market: Popularity, Threats, and Defense Strategies
Architect
Architect
Mar 8, 2026 · Information Security

Why OpenClaw’s Soft Boundaries Spark Security Disasters – Lessons for AI Agents

This article reviews recent OpenClaw security incidents, from a high‑profile email‑deletion failure caused by context compaction to supply‑chain attacks on Skills, analyzes the underlying architectural flaws of soft boundaries and missing execution‑time safeguards, and proposes a three‑layer hardening framework for AI agents.

AI Agent SecurityOpenClawOperational Hardening
0 likes · 19 min read
Why OpenClaw’s Soft Boundaries Spark Security Disasters – Lessons for AI Agents
Black & White Path
Black & White Path
Feb 24, 2026 · Information Security

Hacker Groups Massively Exploit OpenClaw Vulnerabilities to Steal API Keys and Deploy Malware

Multiple hacking groups have leveraged critical vulnerabilities in the open‑source AI framework OpenClaw—formerly MoltBot and ClawdBot—to conduct large‑scale credential theft, supply‑chain poisoning, and malware deployment, compromising tens of thousands of instances worldwide within days of its viral spread.

AI securityAPI key theftCVE-2026-25253
0 likes · 4 min read
Hacker Groups Massively Exploit OpenClaw Vulnerabilities to Steal API Keys and Deploy Malware
AntTech
AntTech
Jun 16, 2025 · Information Security

Uncovering New Attack Vectors in Model Context Protocols: Risks and Defenses

A comprehensive study reveals that Model Context Protocol (MCP) platforms lack strict vetting, users struggle to detect malicious servers, and current large language models cannot effectively resist MCP‑level injection attacks, highlighting critical security challenges and proposing mitigation strategies.

LLM SecurityMCPinformation security
0 likes · 11 min read
Uncovering New Attack Vectors in Model Context Protocols: Risks and Defenses
Alibaba Cloud Observability
Alibaba Cloud Observability
Nov 22, 2024 · Information Security

Detecting CDN Supply‑Chain Attacks with Browser Probing

This article explains how browser‑based probing can monitor the full lifecycle of web services, identify supply‑chain attacks such as CDN poisoning on polyfill.io and BootCDN, and use rich assertions, black‑/white‑list checks, and multi‑step scripts to protect site integrity and compliance.

browser monitoringcdn securitysupply chain attack
0 likes · 10 min read
Detecting CDN Supply‑Chain Attacks with Browser Probing
Alibaba Cloud Native
Alibaba Cloud Native
Nov 18, 2024 · Information Security

How Browser Synthetic Monitoring Detects CDN Supply‑Chain Attacks

The article explains how browser‑based synthetic monitoring can observe the full user experience, use rich assertions and multi‑step scripts to spot CDN supply‑chain poisoning and traffic hijacking, illustrated with real polyfill.io and BootCDN attack cases.

CDN poisoningObservabilitybrowser monitoring
0 likes · 10 min read
How Browser Synthetic Monitoring Detects CDN Supply‑Chain Attacks
21CTO
21CTO
May 26, 2022 · Information Security

How a Malicious PyPI Package Stole Secrets and What It Means for PyPI Security

Recent investigations reveal that the malicious PyPI package “ctx” harvested environment variables, encoded them in base64, and sent them to a Heroku endpoint, while attackers also hijacked the package’s maintainer account via domain takeover, highlighting serious vulnerabilities in PyPI’s package and account security processes.

Domain HijackingPyPIPython
0 likes · 5 min read
How a Malicious PyPI Package Stole Secrets and What It Means for PyPI Security
Programmer DD
Programmer DD
Mar 18, 2022 · Information Security

How a Node‑IPC Supply‑Chain Attack Hijacked Vue‑CLI Projects

A malicious update to the npm package node‑ipc, used by vue‑cli, injected anti‑war code that creates unwanted files, overwrites system directories for Russian and Belarusian IPs, and sparked a community response that led to a patched vue‑cli release and detailed remediation steps.

Vue CLImalwarenode-ipc
0 likes · 5 min read
How a Node‑IPC Supply‑Chain Attack Hijacked Vue‑CLI Projects
Programmer DD
Programmer DD
Jan 9, 2021 · Information Security

Is JetBrains Behind the SolarWinds Hack? Unpacking the Investigation

JetBrains, the maker of IntelliJ IDEA and Kotlin, is under U.S. security scrutiny for a possible link to the SolarWinds supply‑chain breach, with officials questioning a TeamCity vulnerability while the company denies involvement and cites misconfiguration as the likely cause.

JetBrainsSolarWindsTeamCity
0 likes · 4 min read
Is JetBrains Behind the SolarWinds Hack? Unpacking the Investigation
21CTO
21CTO
Sep 22, 2015 · Information Security

What Was XcodeGhost? Inside the 2015 iOS Supply‑Chain Attack and Its Aftermath

The article chronicles the 2015 XcodeGhost incident, detailing how a malicious Xcode version infected dozens of popular iOS apps, the response from Tencent, Apple, and security researchers, and the lessons learned for developers and the broader mobile security community.

App StoreMobile SecurityXcodeGhost
0 likes · 13 min read
What Was XcodeGhost? Inside the 2015 iOS Supply‑Chain Attack and Its Aftermath